Replies: 2 comments
-
Hi @ntx-ben Did you managed to fix this? |
Beta Was this translation helpful? Give feedback.
0 replies
-
Unfortunately no, and I've since moved back to Istio. |
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
Uh oh!
There was an error while loading. Please reload this page.
-
Hi,
I'm following the example to use a self-signed certificate using cert-manager to use HTTPS in gloo-edge (https://docs.solo.io/gloo-edge/1.5.25/guides/integrations/cert_manager/).
I'm using Kubernetes 1.20.2 (in KinD) in a local development environment, and gloo-edge 1.18.12.
I've setup cert-manager and created a self-signed Root CA, then generated a new Certificate to be used by gloo-edge, per https://docs.solo.io/gloo-edge/latest/guides/security/tls/server_tls/. The Certificate looks like this:
The certificate gets generated successfully and is stored in the
upstream-tls
secret.Then, in my VirtualService:
I have RouteTables after that. Using HTTP (removing the sslConfig stanza) works perfectly. However with sslConfig, trying to curl the endpoint gives me the following error:
I also get a
ERR_BAD_SSL_CLIENT_AUTH_CERT
when trying with a web browser.I cannot figure out what's wrong. The exact same process works in Istio. There is no time skew, certificate looks OK, ...
Anyone sees anything I missed?
Beta Was this translation helpful? Give feedback.
All reactions